Post job

Security architect jobs in Gilbert, AZ

- 112 jobs
All
Security Architect
Security Engineer
Information Security Engineer
Senior Security Analyst
Senior Information Security Engineer
Security System Engineer
Senior Information Security Analyst
  • Principal Information Security Architect

    Lumen 3.4company rating

    Security architect job in Phoenix, AZ

    Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. **The Role** The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies. **The Main Responsibilities** + Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures. + Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process. + Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support. + Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed. + Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business. **What We Look For in a Candidate** Required: + Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or + Master's degree in computer science, engineering, or related field with 12+ years of relevant experience. + Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA. + Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR). + Software development experience. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges: $149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process. Learn more about Lumen's: + Benefits (**************************************************** + Bonus Structure \#LI-Remote **What to Expect Next** Requisition #: 340981 **Background Screening** If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. **Equal Employment Opportunities** We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. **Disclaimer** The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions. In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information. Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
    $164k-218.7k yearly 2d ago
  • Application Security Architect

    Cross Boarder Talents

    Security architect job in Tempe, AZ

    Summary of This Role Responsibilities range from auditing code, architecture and databases used in custom-developed web and cloud applications, to testing for common application level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening. Applicant must possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses and vulnerability analysis. Candidate should have experience securing web and mobile applications, APIs, micro-services, containers, cloud and cloud-hybrid architectures. Responsibilities include: • Working with application development and QA teams across multiple products to: Review, evaluate and prioritize vulnerability findings • Provide SME support on secure code implementation, design and architecture. • Threat-modeling & risk analysis • Training • Participate in providing annual OWASP & PCI training for developers • Helps maintain updated Secure Coding Best Practices • Common application level vulnerabilities • Risk Management • Findings/vulnerability prioritization • Mitigation strategy • Controls Evaluation - Review, validate, recommend and create standards • Review of open-source development libraries for security risks • Web application firewall (WAF) rule development and implementation • Security technologies review and recommendations REQUIREMENTS • Qualifications: Bachelors of Computer Science or similar - 6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development. • Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews - • Experience with the Top 10 OWASP (Open Web Application Security Project) vulnerabilities (most critical web vulnerabilities) and how to identify and remediate them - Solid understanding of Information Security in general and the specific behaviors that would secure TSYS information assets - • Ability to translate Information Security policies and procedures into language that a business and/or technical person can understand; and ability to effectively communicate with both non-technical and technical people - • Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges - Ability to work well inside and outside the team. ******Please be inform that at this time all the positions do not have any relocation package, or the flexibility to work remotely, and do not offer any work permit, all the candidates must have their own authorization paper work. Interested! Send your updated CV and answer the questions below: 1) Have you ever worked or applied to this company before? 2) How far are you from the location? Where are you located? 3) What are your salary expectations for this position? 4) Are you a US citizen or a green card holder? (the company will not provide any work visa, they must have their own) 5) How many years of experience do you have in this industry? 6) Why are you looking for a new opportunity
    $108k-159k yearly est. 60d+ ago
  • Information Security Architect

    Forhyre

    Security architect job in Phoenix, AZ

    Job Description We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices. This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. To be Successful in this Role Develop an architectural vision to support the continued growth of the product suite Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use Experience with privacy-enhancing technologies and encryption techniques. Working knowledge of cloud security architecture strategies, frameworks, and reference models Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives Ability to build Risk Models and analyze security weaknesses in complex technology deployments. Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc. Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design. Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward. Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans. Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security. Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment. Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives. Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components. You Will Have 8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.) Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations. Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics. Hands-on experience with Cloud Technologies AWS, Azure & GCP Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks Experience in managing and contributing to incident response Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation. Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
    $108k-159k yearly est. 3d ago
  • Google Cloud Security Architect

    Slalom 4.6company rating

    Security architect job in Phoenix, AZ

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies As a Consultant or Senior Consultant, you will collaborate with cross-functional teams, including IT, security, and business units, to design and implement Google Cloud-based application innovation solutions. You will work alongside experienced cloud architects, data scientists, and other specialists, ensuring the successful delivery of scalable, cloud-native applications and AI-powered solutions. What You'll Do * Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor. * Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles. * Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance. * Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools. * Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data. * Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap. * Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients. * Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients. * Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities. What You'll Bring * Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor. * Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments. * Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud. * Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture. * Experience in security and risk advisory consulting, particularly related to cloud security transformations. * Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs. * Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices. * Relevant certifications are strongly desired, including (but not limited to): * GCP Professional Security Engineer * GCP Professional Cloud Architect * CISSP * Security+ About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this position the base salary pay ranges are listed below. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. East Bay, San Francisco, Silicon Valley: * Consultant: $120,000-$177,000 * Senior Consultant: $140,000-$203,000 San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC: * Consultant: $110,000-$162,000 * Senior Consultant: $130,000-$186,000 All other locations: * Consultant: $105,000-$148,000 * Senior Consultant: $115,000-$171,000 EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. We are accepting applications until 12/31.
    $140k-203k yearly 6d ago
  • Sr Information Security Engineer

    MUFG (DBA

    Security architect job in Tempe, AZ

    Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we're 150,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world. With a vision to be the world's most trusted financial group, it's part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career. Join MUFG, where being inspired is expected and making a meaningful impact is rewarded. The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details. Job Summary: The Assistant Vice President in Security Engineering will be responsible for supporting and enhancing Unix-based security infrastructure across enterprise environments. This role requires deep technical expertise in AIX and RedHat Linux systems, along with strong scripting skills in Bash, Korn, Shell, and Python to automate security tasks and streamline operations. The candidate should be proficient in using Ansible for configuration management and have a solid understanding of TCP/IP networking principles. Key responsibilities include analyzing system logs to identify and resolve issues, utilizing Splunk and SIEM platforms for threat detection, and ensuring secure configurations across Unix systems. The role also involves working with threat detection tools and file integrity monitoring solutions, as well as managing SSH protocols and secure key access. Responsibilities: * Administer and secure Unix-based systems (AIX, RedHat Linux) across enterprise environments, ensuring compliance with internal security policies and external regulatory standards * Develop and maintain automation scripts using Bash, Korn, Shell, and Python to support security operations and system hardening * Assist in improving Ansible playbooks for secure configuration deployment and infrastructure consistency * Monitor and analyze system logs to identify anomalies, troubleshooting issues, and supporting incident response efforts * Utilize SIEM platforms such as Splunk to detect threats, correlate events, and support forensic investigations * Evaluate and remediate insecure configurations across Unix systems, contributing to continuous improvement of security posture * Support threat detection and file integrity monitoring initiatives, integrating tools and processes into Unix environments * Secure SSH configurations, including key management, access controls, and audit logging * Collaborate with cross-functional teams to support secure application deployments and infrastructure changes * Contribute to the development of security metrics and reporting to track system health, compliance, and risk indicators Qualifications: * 3 to 5 years background in IT administration with emphasis on Unix systems, including AIX and RedHat Linux * Proficient in scripting languages such as Bash, Korn, Shell, and Python, with a focus on security automation and tooling. * Experience with Ansible is a plus, but not required * Familiarity with TCP/IP networking, including secure configuration and troubleshooting * Skilled in log analysis and issue identification using native Unix tools and centralized logging platforms * Hands-on experience with Splunk and other SIEM technologies for monitoring and threat detection * Ability to identify and remediate insecure configurations across Unix-based systems * Exposure to threat detection methodologies and file integrity monitoring tools * Deep understanding of SSH, including secure key management and access control Education: * Bachelor's degree in Computer Science or a closely-related discipline, or an equivalent combination of formal education and experience "Visa sponsorship/support is based on business needs. We do not anticipate providing visa sponsorship/support for this position." The typical base pay range for this role is between $113k - $146k depending on job-related knowledge, skills, experience, and location. This role may also be eligible for certain discretionary performance-based bonuses and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, and paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below. MUFG Benefits Summary We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any. The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified. We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual's associates or relatives that is protected under applicable federal, state, or local law.
    $113k-146k yearly Auto-Apply 17d ago
  • Senior Information Security Engineer

    Irvine Technology Corporation

    Security architect job in Scottsdale, AZ

    Job Description Senior Information Security Engineer Our client is seeking a Senior Information Security Engineer to join their cybersecurity organization and play a critical role in strengthening their enterprise security posture. This is an exciting opportunity to lead detection engineering initiatives, drive proactive threat-hunting efforts, and enhance visibility across cloud and hybrid environments. You will partner closely with cross-functional teams to implement modern security controls, respond to emerging threats, and improve the organization's overall defense strategy. Location: Scottsdale, AZ 85255 Compensation: This job is expected to pay about $150,000-170,000 base salary depending on experience No Visa Sponsorship Available for this role What You'll Do: Key responsibilities Develop advanced detection rules, custom alerts, and attack-surface reduction strategies across Microsoft Defender and Microsoft Sentinel. Conduct proactive threat-hunting activities using log analytics, behavioral analysis, and threat intelligence to identify malicious activity. Operate and optimize enterprise security tools including endpoint protection, SIEM, intrusion prevention, and vulnerability management platforms. Automate detection, response, and remediation workflows using scripting and orchestration to improve operational efficiency. Serve as a technical lead during major security incidents, providing investigation oversight, root-cause analysis, and executive-level reporting. What Gets You the Job: Qualifications 5+ years of hands-on experience in security engineering with strong expertise in Microsoft Defender, vulnerability management, and SIEM platforms (Microsoft Sentinel preferred). 3+ years of threat-hunting experience including detection creation, log analysis, and behavioral analytics using tools such as Sentinel or Splunk. Strong understanding of TCP/IP, authentication protocols, secure coding principles, and cloud/hybrid infrastructure security. Experience building automated security workflows or detections using PowerShell, Python, or similar scripting languages. Excellent communication, collaboration, and leadership skills, with the ability to mentor junior staff and present technical insights to executives. If you're interested in making a high-impact contribution to a forward-leaning security team, we encourage you to apply and learn more about this opportunity. If we are still actively screening for this role, our AI Recruiter Avery will email you to schedule a virtual meeting to learn more about your background. Irvine Technology Corporation (ITC) connects top talent with exceptional opportunities in IT, Security, Engineering, and Design. From startups to Fortune 500s, we partner with leading companies nationwide. Our AI recruiter Avery helps streamline the first step of your journey-so we can focus on what matters most: helping you grow. Join us. Let us ELEVATE your career! Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
    $150k-170k yearly 15d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Platform Engineer - Cloud & Security Automation

    Kubra

    Security architect job in Tempe, AZ

    Job DescriptionAs a Platform Engineer - Cloud & Security Automation, you will help build the infrastructure, guardrails, and automation that make KUBRA's Internal Developer Platform secure, reliable, and easy to use. You'll work with Kubernetes, Terraform, CI/CD, and cloud security tooling to accelerate how teams build and ship services. This role is ideal for engineers who have solid platform engineering fundamentals and want to grow deeper into Kubernetes, cloud security automation, and large-scale infrastructure design. You will help strengthen the shared platform that powers KUBRA's products, enabling teams to ship more confidently with built-in security and paved-path tooling. Your work reduces toil, improves resiliency, and strengthens our cloud foundation. This is a hybrid position based out of our office in Tempe, Arizona . How You'll Contribute Build and support Terraform modules, Kubernetes manifests, and GitOps pipelines that power the platform and developer portal. Help implement security guardrails and automated controls across our cloud environments. Contribute to CI/CD workflows using any modern tooling (GitHub Actions, CircleCI, etc.). Participate in platform demos, documentation, and cross-team collaboration. Partner with senior engineers to implement new platform capabilities and automation. Help implement Kubernetes security measures, such as network security Strengths That Shine in This Role Exposure to GitOps (Argo CD, FluxCD, Spinnaker). Experience with any policy-as-code tool (Kyverno or Gatekeeper preferred). Familiarity with cloud-native security services in any major cloud provider. Knowledge of regulated environments (SOC2, PCI) helpful but not required. Curious and eager to learn. Strong fundamentals and willingness to dive deep in Kubernetes and security. Comfortable collaborating with teammates and asking questions. Bias for automation and proactive improvement. Skills That Matter in This Role 2-4 years in Platform Engineering, SRE, DevOps, or Software Engineering. Coding experience in Python, Go, or another modern language. Practical Kubernetes experience (deployment, debugging, security fundamentals). Comfort with Terraform or other IaC tools. Experience with CI/CD pipelines and cloud platforms (AWS, GCP, or Azure). Interest in growing skills in cloud security automation. Why You'll Love Working Here Thrive in an award-winning, innovation-driven culture that champions growth, embraces diversity, and fosters inclusion for all. See our awards → Earn competitive pay with annual performance-based bonuses that recognize your impact Invest in your future with our 401(k) plan featuring company matching Stay healthy with comprehensive medical, dental, and vision coverage, plus HSA and FSA options Recharge with paid vacation and sick days - and a paid day off for your birthday Make an impact with two paid volunteer days to give back to your community Advance your skills with free access to LinkedIn Learning and our education reimbursement program Prioritize your mental health with a free premium Headspace membership Stay active with our on-site fitness center Refuel at fully stocked refreshment stations with complimentary drinks and snacks Enjoy exclusive perks with access to “Tickets at Work” discounts and memberships Equal Employment Opportunity: KUBRA is committed to the principles of equal employment opportunity. We do not discriminate in hiring on the basis of sex, gender identity, sexual orientation, race, color, religion, creed, national origin, physical or mental disability, protected veteran status, or any other characteristic protected by federal, state, or local law. We will provide accommodations during the recruitment process upon request by emailing **************************. Information received relating to accommodation will be addressed confidentially.We thank all applicants for their interest; however, only candidates under consideration will be contacted. While we value the skills and experiences listed in our job requirements, we also recognize that talent comes in many forms, and welcome applications from candidates who meet most but not all specified requirements. If you possess a strong desire to learn and grow in a dynamic work environment, apply now! KUBRA is a fast-growing company that delivers customer communications solutions to some of the largest utility, insurance, and government entities across North America. KUBRA offers billing and payments, mapping, mobile apps, proactive communications, and artificial intelligence solutions for customers. With more than 1.5 billion customer interactions annually, KUBRA services reach over 40% of households in the U.S. and Canada. KUBRA is an operating subsidiary of Hearst. Our office is small enough to allow creative individuals to flourish, yet large enough to provide long-term stability. We place a tremendous amount of responsibility on our team members to be productive, focused and self-motivated. We offer a casual work environment, competitive compensation and a stellar benefits program. KUBRA does not typically provide immigration-related assistance, including employment-based work visa (e.g. H-1B) sponsorship, work permit applications and extensions, permanent residence (green card) sponsorship, LMIA applications or permanent residency nominations. Candidates must ensure they have legal authorization to work in the U.S/ Canada. All sponsorship determinations are case by case based on business need.
    $87k-122k yearly est. 5d ago
  • Security Engineer

    Revspring 4.4company rating

    Security architect job in Phoenix, AZ

    Job Title: Security Engineer Job Summary: This is not a passive, monitor-the-dashboard role - it is designed for a builder. The Security Engineer at RevSpring will lead efforts to secure infrastructure by owning, integrating, and optimizing the full lifecycle of security tools. From SIEM and CSPM to EDR and SOAR, each control will be made actionable, automated, and aligned to risk. Collaboration across teams will be essential to embed security into systems and processes, driving measurable maturity and delivering real protection - not just checklists. The role also supports compliance initiatives, leads risk assessments, manages security frameworks (NIST, HITRUST, ISO 27001), and responds to emerging threats with a solid understanding of both offensive and defensive security practices. Positioned at the intersection of security engineering, architecture, and strategy, this is a high-impact opportunity. This position is part of a high-impact team focused on building the security backbone for an organization that enables critical communications in healthcare, finance, and beyond. The work contributes directly to securing the ways millions of people connect with the services they depend on - confidently and securely. For professionals who view security maturity not as a project, but as an ongoing discipline, this role offers the ideal environment to thrive. Essential Functions: Tool Ownership & Security Architecture Own the lifecycle of security platforms including EDR/XDR, SIEM, SOAR, CSPM, IAM, and vulnerability management. Integrate and automate security tools and workflows across IT, cloud, and SOC environments. Continuously tune alerting, dashboards, and policies to reduce noise and improve signal quality. Maintain security control maps and maturity metrics. Security Maturity & Measurement Build and maintain RevSpring's Security Tool Maturity Roadmap. Track and report key performance indicators (KPIs) and return on investment (ROI) for all tools. Map control capabilities to frameworks such as NIST CSF, HITRUST, ISO 27001, and CIS Controls. Identify coverage gaps and eliminate redundant tools. Security Engineering & Compliance Conduct regular security risk assessments and audits across systems, applications, and networks. Design and implement new security solutions, collaborating closely with infrastructure, cloud, and AppSec teams. Support and maintain compliance with HIPAA, HITRUST, PCI-DSS, SOX, NIST, and GLBA. Formulate and manage IT security incident response strategies. Automation & Enablement Develop scripts and integrations using Python, PowerShell, Bash, and REST APIs to automate security operations. Embed security controls into CI/CD pipelines and infrastructure as code. Maintain documentation, runbooks, and diagrams to support repeatable security improvements. Governance & Cross-Functional Collaboration Partner with procurement, risk, and compliance teams to manage tool renewals, licensing, and governance. Communicate security tool performance, maturity, and improvements to leadership in clear, data-driven ways. Translate complex technical issues into business-relevant language. Minimum Requirements: Specific Job Skills: Strong understanding of at least three areas of the modern security stack: SIEM, EDR/XDR, SOAR, CSPM, IAM, or vulnerability management. Experience in cloud security (AWS, Azure, or GCP) and implementing security controls across cloud platforms. Experience with security assessments, architecture design, and risk-based security implementation. Familiarity with standards/frameworks: NIST CSF, HITRUST, ISO 27001/27002, COBIT, ITIL, CIS. Proficient in scripting/automation (e.g., Python, PowerShell) and integrating APIs. Experience with penetration testing, ethical hacking, or advanced threat detection tools. Ability to support compliance requirements and perform security reviews for internal and external stakeholders. Experience building or managing a security tool governance or maturity framework. Certifications such as GDSA, GCIA, AWS Security Specialty, CISSP, CISM, or similar. Familiarity with MITRE ATT&CK, secure coding practices, and modern DevSecOps workflows. Strong project management, reporting, and stakeholder communication skills. Analytical mindset with the ability to break down complex problems. Strong written and verbal communication skills - technical and non-technical audiences. Proven ability to work independently and as part of a team. Flexible and adaptable to evolving business and technical priorities. Passion for continuous learning and measurable security outcomes. Education: N/A Experience: 3-7 years of hands-on experience in Security Engineering, SOC Engineering, or DevSecOps. Supervision: N/A Certifications: N/A Language Skills: Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations. Ability to write reports, business correspondence and procedure manuals. Ability to effectively present information and respond to questions from a variety of both internal and external sources. Physical Capabilities: Standard categories The physical capabilities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee is occasionally required to stand and walk. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception, and ability to adjust focus. RevSpring is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Note: This may not describe all of the job responsibilities and standards assigned to this position. The duties may change from time to time. RevSpring does not discriminate against any group in hiring or employment practices. Nothing in this job description constitutes a contract for employment.
    $93k-130k yearly est. 10d ago
  • Cloud Security Engineer

    Iridium Satellite LLC

    Security architect job in Chandler, AZ

    Iridium is an award-winning and innovative satellite communications company with bragging rights to the only network that offers voice and data connectivity anywhere in the world. For over 20 years, Iridium's unique network and services have supported critical communications needs for individuals, businesses, and the evolving Internet of Things. At Iridium, we understand the importance of staying connected and the limitations of traditional communications networks. People across the globe, including first responders, humanitarians, global militaries, scientific researchers, and lone workers, as well as ships, aircraft and remote operations all rely on Iridium to stay connected. We take our responsibility for providing these essential communications very seriously and pride ourselves on offering a reliable lifeline when needed. Likewise, Iridium is committed to providing an exciting and innovative workplace, where employees are challenged to think outside the box and collaborate on new, bold ideas and solutions. Our talented teams are passionate about their work and the impact our company makes around the world. Iridium fosters an empowering and inclusive culture that allows employees to genuinely be their best selves. We are looking for others who want to join this truly unique company that celebrates our employees and provides the opportunity to truly make a difference in the world. What We're Looking For: If you enjoy learning about and working with breakthrough technologies and are enthusiastic about working in the space industry, then you will be excited about the Senior Software Engineer opening with Iridium for a Space Development Agency (SDA) project. As the Senior Software Engineer within the Ground Systems Development team, you will apply cutting edge technologies to rapidly develop and deploy ground system operations and user service capabilities within a satellite operations environment. Additionally, the Senior Software Engineer will identify and autonomously implement ideas/solutions within the larger development team to support cross-functional efforts across all areas of ground system software development. What You'll Do: * Develop high performing/scalable App Cyber Security architecture and implementation to meet the requirements of the SDA project * Engage in cross-team DevOps, Ground and Constellation development to support AWS PaaS deployment environment and automation. * Develop Work within the Agile/Scrum framework for software development (Atlassian tool suite desired) * Create or maintain build environments for software products * Play a key role in planning and executing software releases per stakeholder/program schedules and budgets * Update issue/feature data in Atlassian Project/Software tracking tools * Follow existing Iridium processes for Change Control, Prioritization, Risk Management, Commercial off-the-shelf (COTS) Management, Build and Test software deployments and use advanced knowledge to assist in development of process/procedure documentation materials * Edit, structure and present data, concepts and arguments clearly and succinctly through briefings and documentation * Respond to questions within scope from stakeholders, as appropriate What You'll Need to Succeed: * Bachelor of Science degree in Computer Science, or other engineering discipline * 8+ years software programming experience * Coding experience on Agile based teams * Excellent communication skills, with the ability to clearly convey products, deliverables, analyses, and/or issues to groups outside of your team or those who are unfamiliar with the topic * Have confidence and be able to easily build relationships with leadership and colleagues outside of your team * Possess an analytical mindset, with the ability to understand a situation or problem and think critically to make decisions and come up with out-of-the-box solutions * Be proactive in providing feedback and be enthusiastic in sharing your knowledge with others * Capable of prioritizing your own tasks and potentially the tasks of others while making sure deadlines are met * Proactivity in seeking out ways to continuously improve yourself and gain new knowledge, including the ability to learn the different software that make up the System Performance and Analysis software * Ability to comprehend technical documentation * Have a positive attitude to take on ever increasing software development tasks * Passion for working in a team driven environment consisting of operators, software testers, senior developers, and system engineers Things That Would be Great if You Brought to the Table: * Experience with the following technologies: * Design and implementation of Role-based Access Control * Keycloak / Vault / IPA / IAM * mTLS / SSL or security protocol equivalent * Cryptography and PKI/Certifications * Authentication and Authorization architecture * Design and implementation of Kubernetes auto-deployment to AWS (Helm Charts) * Linux based environments and bash shell scripting * Security Vulnerability Analysis and Procedures (CVE, TLS) * Terraform * Python / Java / C++ / Type Script / Perl * RESTful / HTTP / ELK or similar / WebSockets * XML / JSON / SQL * SQL: (e.g., PostgreSQL) and NoSQL based DBs (e.g., Mongo) * js / Apache Web Server * Assist in software development response to security findings * Atlassian management/software development tools: Jira / Git / Crucible / Confluence * Micro services architecture * Automated testing frameworks * Gov and non-Gov Amazon Web Services (AWS) cloud environments We'll Also Need You To: * This position directly performs under, supports, or is exposed to a U.S. government contract. To comply with the requirements of Iridium's U.S. government contracts, applicants for this position must be U.S. citizens. Work Environment: This position primarily works in an office setting and is largely sedentary with the majority of the position working with a computer. The role typically requires the use of basic office equipment such as a phone, video, computer, keyboard, mouse, and printer. Iridium is an Equal Opportunity Employer, including individuals with disabilities and protected veterans.
    $87k-122k yearly est. Auto-Apply 60d+ ago
  • Security Engineer(32790)

    Idealforce

    Security architect job in Phoenix, AZ

    IDEALFORCE has a CONTRACT position available immediately for Security Engineer (Nexpose & Nessus) to join our customer in Phoenix AZ. This is an ONSITE position. Please find below additional details about this job. Kindly respond with your most up to date resume if you would like to pursue this opportunity. Client is considering only LOCAL CANDIDATES for this position. The Arizona State Retirement System is seeking an experienced Security Engineer consultant with skills as at least 2 years of experience as a Nexpose vulnerability scanner expert. This position will perform the configuration and fine tuning for output for the agency's Nexpose enterprise implementation. Job Description - collaborate with all realms of staff members to assist them in protecting the ASRS information assets. - Set and work within deadlines to complete assignments; exercise resourcefulness and prioritize tasks to meet multiple demands; set objectives and goals to measure performance - Manage the delivery of projects on-time and within budgetary constraints - Be detail oriented and thorough - Develop procedures, analyze problems and design effective plans for process improvement surrounding the vulnerability scanning environment - Ability to identify security issues and risks, and assist in developing mitigation plans. - Hands on coordination with implementation and/or configuration of the entire Nexpose environment reviewing the existing configuration relative to our requirements and making appropriate adjustments - Hands on experience developing and providing technical and management reports from the Nexpose environment Qualifications - In-depth experience with NEXPOSE including, implementation, configuration, maintenance and report generation - In-depth experience with NESSUS including, implementation, configuration, maintenance and report generation - Current information security certification in one or more of the industry recognized organizations (ISC2, ISACA, etc.) - Successful experience and ability to perform knowledge transfer to technical staff - Should have at least 4 years of information security experience Additional Information - "All your information will be kept confidential according to EEO guidelines". - All candidates who are authorized to work in US are encouraged to apply. - Candidates must clear the Background check prior to commencing the assignment. SOURCER ASSIGNED: Pete Tylor; Email: pete dot tylor at idealforce.com Disclaimer : The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.
    $87k-123k yearly est. 21h ago
  • Electronic Security Engineer

    Insight Global

    Security architect job in Phoenix, AZ

    Conducting quality checks to ensure that systems are according to design specifications. Providing technical support to other engineers and project managers. Keeping track of project deadlines for customer and PM. Scheduling technicians according to daily tasks and deadlines to meet customer requirements. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements Education/Certifications: High school or GED equal Associates/Bachelor's degree required and/or equivalent experience (level appropriate) years programming or related industry experience on large commercial or federal projects Knowledgeable of low voltage electrical concepts Ability to diagnose, troubleshoot and resolve technical problems Lenel Cert OSHA 30 Cert AVIXA CTS
    $87k-123k yearly est. 14d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Security architect job in Scottsdale, AZ

    Job Description L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability. Powered by JazzHR 6oXedfgOJk
    $87k-119k yearly est. 9d ago
  • Security Systems Engineer

    Exyte Group

    Security architect job in Chandler, AZ

    Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards. Explore your tasks and responsibilities * Design and implement integrated security systems tailored for advanced technology and cleanroom environments. * Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments. * Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure. * Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols. * Consult with stakeholders on security requirements, best practices, and regulatory compliance. * Develop strategies to prevent unauthorized access while maintaining operational continuity. * Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements. * Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions. * Support both large-scale and small-scale security projects, from design through commissioning and validation. * Prepare and maintain detailed documentation for security system designs, installations, and compliance audits. * Other duties as assigned Show your expertise Minimum Required * Bachelor's degree in Engineering or a related field. * 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities. Preferred * Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable. * Prior experience as a consulting engineer preferred * Prior experience with Advanced Technology * Experience working within a team environment * Experience in the quality control review process * Experience contributing to continuous improvement processes Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency. Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws. Contact: You want to be part of the Exyte team? We look forward to receiving your application! For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************ Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
    $78k-112k yearly est. Easy Apply 2d ago
  • Security Engineer

    Sundt Construction 4.8company rating

    Security architect job in Tempe, AZ

    As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do. At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America. Job Summary As a Security Engineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy. Key Responsibilities 1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls. 2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks. 3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices. 4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly. 5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications. 6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans. 7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations. 8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews. Minimum Job Requirements 1. Ability to work independently and manage multiple tasks in a fast-paced environment. 2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience. 3. Excellent problem-solving skills and attention to detail. 4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration. 5. Minimum of 3-5 years of experience in cybersecurity or a related field. 6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint. 7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred. 8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams. 9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002). Note: Job Description is subject to change at any time and may include other duties as assigned. Physical Requirements 1. May stoop, kneel, or bend, on an occasional basis 2. Must be able to comply with all safety standards and procedures 3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis 4. Will interact with people and technology frequently during a shift/work day 5. Will lift, push or pull objects up to 50Ibs on an occasional basis. 6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day. 7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors Safety Level Non-Safety Sensitive Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials. Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws. Benefit list: Market Competitive Salary (paid weekly) Bonus Eligibility based on company, group, and individual performance Employee Stock Ownership Plan & 401K Industry Leading Health Coverage Starting Your First Day Flexible Time Off (FTO) Medical, Health Savings, and Wellness credits Flexible Spending Accounts Employee Assistance Program Workplace Wellness Programs Mental Health Program Life and Disability Insurance Employee-Owner Perks Educational Assistance Sundt Foundation - Charitable Employee-Owner's program
    $87k-115k yearly est. Auto-Apply 9d ago
  • Security Engineer

    Ron Turley Associates Inc. 3.7company rating

    Security architect job in Glendale, AZ

    Job DescriptionDescription: Do you see threats where others see business as usual-and love turning that sixth sense into concrete defenses? We're looking for a Security Engineer to guard every layer of RTA's tech stack and culture. Reporting to our Head of Infrastructure & SRE, you'll shape policies, stand up tooling, and partner with every department to keep our customers' fleets-and our reputation-safe. If you can translate “zero-day” into plain English, herd vulnerability scans like a pro, and still crack a smile over coffee-break memes, you might be the peanut butter to our jelly. Read on and apply! What We're Looking For We're looking for a service minded protector who measures success by how secure and empowered others feel, and who is comfortable with healthy conflict without having thin skin. This person should embody being humble, hungry, and smart in the Patrick Lencioni sense, and be a true hands-on doer who can write a policy in the morning and script a GuardDuty alert after lunch. They need to be a team player who is just as willing to lift boxes, clean floors, or hold doors if that is what it takes to get the job done. Specifically for This Role, Someone Who Is a security thought-leader. Owns projects, tasks and can assess the right solutions for the right job. Also can personally execute and deliver sustainable enhancements to strengthen security postures. Has solid experience hardening AWS environments (VPCs, Security Groups, IAM, GuardDuty). Runs endpoint security with tools like SentinelOne and tunes a Kroll (or similar) SIEM for signal over noise. Translates complex security security threats into understandable remediations, while communicating the potential risk level, likelihood and impact. Manages Qualys (or equivalent) scans, tracks remediation, and coordinates annual external vulnerability & penetration tests. Implements and maintains SAST / DAST pipelines to catch issues before they ship. Drives patch management (e.g., WSUS for Windows) and assesses third-party dependencies for risk. Leads SOC 2 (and future frameworks) evidence gathering, controls mapping, and auditor wrangling. Partners with development teams to incorporate security scanning and vulnerability assessment within CI / CD pipelines. Champions the Security-as-a-Service mindset of utilizing repeatable processes, automation and solution sustainability. Develops easy-to-follow policies, runs security awareness training, and communicates risk in plain language to execs and engineers alike. Key Responsibilities Hunt & Fix: Own the vulnerability-management cycle: Qualys scans, prioritization, and verification of fixes across cloud and on-prem assets. Protect & Detect: Deploy, fine-tune, and monitor SentinelOne, GuardDuty, SIEM dashboards, and log pipelines. Automate & Integrate: Embed SAST/DAST checks into CI/CD (GitHub Actions) and champion “security as code.” Govern & Guide: Write, update, and socialize security policies and playbooks that are actually readable. Comply & Report: Shepherd yearly SOC 2 evidence, coordinate external pen-tests, and deliver clear metrics to leadership. Educate & Collaborate: Run lunch-and-learns, tabletop exercises, and partner with Product, Engineering, and Support so security is everyone's job. Bonus Points: AWS Certified or related, CISSP, SSCP, CCSP, OSCP, CEH, or comparable. Tools: Terraform/CloudFormation for secure IaC, experience with Kubernetes RBAC, or prior work in regulated environments (PCI, HIPAA, etc.). Qualifications 5+ years in security engineering, cloud security, or a closely related field. Demonstrated track record securing AWS workloads and modern DevOps pipelines. Excellent written & verbal communication The Bottom Line We want an ideal team player with an almost frightening intensity around customer service and a passion for protecting others. If you're ready to keep RTA's mission rolling safely-and have some fun doing it-click apply! We've asked you four times now, and you're still reading-bonus points for being thorough. Time to be the Pepper to our Potts and make our security posture unbeatable. #LI-AE1 Requirements:
    $96k-136k yearly est. 15d ago
  • Senior Information Security Analyst

    Arizona Department of Administration 4.3company rating

    Security architect job in Phoenix, AZ

    ARIZONA DEPARTMENT OF HOMELAND SECURITY The Arizona Department of Homeland Security was established in 2006 by the Arizona State Legislature to support the mission of providing strategic direction and access to federal homeland security grant program resources that will further enable the stakeholders' collective goals to prevent, protect, mitigate, respond to and recover from terrorist attacks and other critical hazards that affect the safety, well-being and economic security of Arizona. SENIOR INFORMATION SECURITY ANALYST *This is a hybrid position consisting of remote & in-office requirments* Job Location: 16232 North 28th Avenue Phoenix, Arizona 85053 Posting Details: Annual Salary Range: $68,000 - $90,000 Grade: 24 This position will close on Decemder 19, 2025 Job Summary: This position plays an essential role in protecting the confidentiality, integrity and availability of State information systems and data through the identification of security and privacy protection risks, and ensuring the compliance of systems and organizations with existing Statewide policies and regulatory requirements. This position ensures that the appropriate proactive analysis and auditing of security controls and processes are in place and effective to help the State withstand and/or recover from issues caused by known and unknown internal or external threats. Job Duties: • Ensures organization compliance to Statewide Information Security policies, NIST, ISO, PCI, HIPAA and other security standards by providing information security and privacy protection compliance reviews and proactive assessments. Assists with the development and implementation of enterprise-wide information security and privacy policies and standards • Identify information security and privacy protection risks across the state and direct agencies to adopt risk mitigation strategies, methods and procedures to minimize the risks in accordance with established risk management policies and procedures. Assists with data breach and privacy incident investigations • Participates in projects by evaluating systems security plans and implemented security controls for security and privacy compliance of technology infrastructure and applications to reduce security risk and enhance overall security posture • Support the statewide information security and privacy protection awareness and training programs • Leads or participates with all internal and external security and privacy audits and assessments • Other duties as assigned as related to the position Knowledge, Skills & Abilities (KSAs): Knowledge: • This role demands a comprehensive expertise in information security technologies, with a focus on industry trends, best practices, and the implementation of robust security measures across various domains. The candidate must have a solid understanding of key information protection standards, including NIST, HIPAA, PCI, and IRS, and demonstrate proficiency in assessing and managing risks, ensuring compliance, and addressing vulnerabilities within an organization's infrastructure • In addition, the candidate should possess deep knowledge of cybersecurity workforce dynamics, virtual learning environments, and the development and enforcement of cybersecurity operation policies and procedures. They should be well-versed in the principles and practices of risk management, business continuity, and disaster recovery, with an ability to apply these concepts to real-world scenarios • Expertise in privacy laws and regulations, cybersecurity threats and vulnerabilities, and the use of advanced cyber defense tools and techniques is essential. The ideal candidate will also have experience with enterprise cybersecurity architecture, identity and access management, and the evaluation and validation of security controls. Familiarity with emerging technologies, insider threat management, and supply chain risk management is crucial, as is knowledge of industry models and frameworks for cybersecurity and data protection. Overall, this role requires a strategic thinker capable of integrating a broad spectrum of cybersecurity knowledge into cohesive and effective security strategies Skills: • This role requires strong customer service skills, along with excellent interpersonal, written, and oral communication abilities to effectively interact with clients and stakeholders. The ideal candidate should possess a robust skill set in identifying gaps in technical capabilities, applying security controls, and interfacing with customers to address their needs. Proficiency in assessing security system designs, applying secure coding techniques, and performing root cause analysis is crucial for maintaining and enhancing system security • Additionally, the candidate must be adept at processing and verifying data for follow-on analysis, as well as deriving evaluative conclusions to support informed decision-making. The ability to communicate complex concepts both verbally and in writing, facilitate group discussions, and create technical documentation is essential. Expertise in developing security assessments, instructional materials, and policy plans is also required. The candidate should be skilled in maintaining standard operating procedures, evaluating laws, regulations, and policies, and analyzing processes to ensure compliance with procedural requirements • Critical thinking and collaboration are key skills for this role, especially in dynamic, fast-paced environments. The ability to analyze large data sets, identify target vulnerabilities, and align privacy and cybersecurity objectives is vital. The candidate should also be proficient in risk assessment, identifying system vulnerabilities, and applying policies that meet system security objectives. Additional skills include performing technical writing, negotiating vendor agreements, and building relationships with internal and external stakeholders to effectively manage and mitigate cybersecurity risks Ability: • The tasks associated with this job involve ensuring the effectiveness and compliance of an organization's cybersecurity and privacy programs. This includes assessing and managing the effectiveness of security controls, correlating training efforts to business or mission needs, and managing accreditation packages to maintain compliance. Establishing and maintaining privacy audit programs is essential for continuous monitoring and mitigation of privacy risks. The role also involves determining the legal and operational impacts of cybersecurity incidents and identifying critical technology procurement needs • Additional responsibilities include researching new vulnerabilities, advising senior management on risk levels and cybersecurity posture, and developing risk profiles. The role requires conducting privacy impact assessments, identifying vulnerabilities, and recommending remediation strategies. There is a strong focus on developing, implementing, and auditing cybersecurity policies, training programs, and compliance processes. Ensuring that contracts and procurement efforts meet legal, funding, and security requirements is also crucial, as is advising on risk management and overseeing cybersecurity audits. Finally, the role includes developing and delivering training, promoting awareness, and ensuring alignment of cybersecurity and privacy practices with organizational goals Selective Preference(s): • Bachelor's degree plus 2 years of extensive experience in information security controls and regulatory compliance (or equivalent experience) • Certified Information Security Systems Professional preferred Pre-Employment Requirements: • Required to drive on State business; must possess a valid Arizona driver's license • Proof of U.S. Citizenship required (due to security clearance) If this position requires driving or the use of a vehicle as an essential function of the job to conduct State business, then the following requirements apply: Driver's License Requirements. Benefits: The State of Arizona offers a comprehensive benefits package to include: • Optional employee benefits include short-term disability insurance, deferred compensation plans, and supplemental life insurance • Life insurance and long-term disability insurance • Vacation with 10 paid holidays per year • Health and dental insurance • Retirement plan • Sick leave Learn more about the Paid Parental Leave pilot program here. For a complete list of benefits provided by The State of Arizona, please visit our benefits page Retirement: • Positions in this classification participate in the Arizona State Retirement System (ASRS) • Please note that enrollment eligibility will become effective after 27 weeks of employment Contact Us: • If you have any questions please feel free to contact Alexis Pagel at ***************** for assistance
    $68k-90k yearly 14d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Security architect job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 48d ago
  • Security Engineer

    The Sundt Companies 4.8company rating

    Security architect job in Tempe, AZ

    JobID: 9112 JobSchedule: Full time JobShift: : As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do. At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America. Job Summary As a Security Engineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy. Key Responsibilities 1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls. 2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks. 3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices. 4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly. 5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications. 6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans. 7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations. 8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews. Minimum Job Requirements 1. Ability to work independently and manage multiple tasks in a fast-paced environment. 2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience. 3. Excellent problem-solving skills and attention to detail. 4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration. 5. Minimum of 3-5 years of experience in cybersecurity or a related field. 6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint. 7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred. 8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams. 9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002). Note: Job Description is subject to change at any time and may include other duties as assigned. Physical Requirements 1. May stoop, kneel, or bend, on an occasional basis 2. Must be able to comply with all safety standards and procedures 3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis 4. Will interact with people and technology frequently during a shift/work day 5. Will lift, push or pull objects up to 50Ibs on an occasional basis. 6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day. 7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors Safety Level Non-Safety Sensitive Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials. Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws. Benefit list: Market Competitive Salary (paid weekly) Bonus Eligibility based on company, group, and individual performance Employee Stock Ownership Plan & 401K Industry Leading Health Coverage Starting Your First Day Flexible Time Off (FTO) Medical, Health Savings, and Wellness credits Flexible Spending Accounts Employee Assistance Program Workplace Wellness Programs Mental Health Program Life and Disability Insurance Employee-Owner Perks Educational Assistance Sundt Foundation - Charitable Employee-Owner's program
    $87k-115k yearly est. Auto-Apply 8d ago

Learn more about security architect jobs

How much does a security architect earn in Gilbert, AZ?

The average security architect in Gilbert, AZ earns between $91,000 and $189,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Gilbert, AZ

$131,000
Job type you want
Full Time
Part Time
Internship
Temporary